Vulnerability Details : CVE-2007-4556
Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via form input beginning with a "%{" sequence and ending with a "}" character.
Vulnerability category: Execute codeDenial of service
Products affected by CVE-2007-4556
- cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*
- cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-4556
3.41%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-4556
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
References for CVE-2007-4556
-
http://www.vupen.com/english/advisories/2007/3041
Third Party Advisory
-
http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050&styleName=Html&version=21701
Vendor Advisory
-
http://forums.opensymphony.com/ann.jspa?annID=54
Patch;Vendor Advisory
-
http://www.vupen.com/english/advisories/2007/3042
Third Party Advisory
-
http://struts.apache.org/2.x/docs/s2-001.html
S2-001 - Apache Struts 2 Wiki - Apache Software FoundationPatch;Third Party Advisory
-
http://secunia.com/advisories/26681
Third Party Advisory
-
http://osvdb.org/37072
Broken Link
-
http://secunia.com/advisories/26694
Third Party Advisory
-
http://wiki.opensymphony.com/display/WW/1.2.3+Press+Release
Vendor Advisory
-
http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050&styleName=Html&version=21706
Vendor Advisory
-
http://issues.apache.org/struts/browse/WW-2030
Third Party Advisory
-
http://secunia.com/advisories/26693
Third Party Advisory
-
http://jira.opensymphony.com/browse/XW-544
Vendor Advisory
-
http://www.securityfocus.com/bid/25524
Third Party Advisory;VDB Entry
Jump to